|
Message-ID: <a2fd9901-d8fc-3ba7-4422-2616bbf23220@linux.ibm.com> Date: Tue, 24 Nov 2020 01:41:13 +1100 From: Andrew Donnellan <ajd@...ux.ibm.com> To: oss-security@...ts.openwall.com, linuxppc-dev <linuxppc-dev@...ts.ozlabs.org> Subject: Re: Linux kernel: powerpc: RTAS calls can be used to compromise kernel integrity On 9/10/20 12:20 pm, Andrew Donnellan wrote: > The Linux kernel for powerpc has an issue with the Run-Time Abstraction > Services (RTAS) interface, allowing root (or CAP_SYS_ADMIN users) in a > VM to overwrite some parts of memory, including kernel memory. > > This issue impacts guests running on top of PowerVM or KVM hypervisors > (pseries platform), and does *not* impact bare-metal machines (powernv > platform). CVE-2020-27777 has been assigned. -- Andrew Donnellan OzLabs, ADL Canberra ajd@...ux.ibm.com IBM Australia Limited
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.